A local, unprivileged attacker with the permission to run VirtualBox
could gain root privileges. A guest OS local user could cause a Denial
of Service (memory consumption) on the guest OS via unknown vectors.

Workaround :

There is no known workaround at this time.

See also :

https://security.gentoo.org/glsa/201001-04

Solution :

All users of the binary version of VirtualBox should upgrade to the
latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-emulation/virtualbox-bin-3.0.12'
All users of the Open Source version of VirtualBox should upgrade to
the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-emulation/virtualbox-ose-3.0.12'
All users of the binary VirtualBox Guest Additions should upgrade to
the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-emulation/virtualbox-guest-additions-3.0.12'
All users of the Open Source VirtualBox Guest Additions should upgrade
to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-emulation/virtualbox-ose-additions-3.0.12'

Training & Certification

The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.